An anonymous reader writes: Please post this to new articles if it hasn't been posted yet. (Copy-paste the html from here so links don't get mangled!)

On February 5, 2014, Slashdot announced through a javascript popup that they are starting to "move in to" the new Slashdot Beta design. Slashdot Beta is a trend-following attempt to give Slashdot a fresh look, an approach that has led to less space for text and an abandonment of the traditional Slashdot look. Much worse than that, Slashdot Beta fundamentally breaks the classic Slashdot discussion and moderation system.

If you haven't seen Slashdot Beta already, open this in a new tab. After seeing that, click here to return to classic Slashdot.

We should boycott stories and only discuss the abomination that is Slashdot Beta until Dice abandons the project.We should boycott slashdot entirely during the week of Feb 10 to Feb 17 as part of the wider slashcott

boolithium writes: People on here are missing the point of the Beta roll out. The elimination of the existing user base is not a side effect, it is a feature. Slashdot as a brand has value, but as a site has limited commercial appeal. The users are the kids at the lunch table, where not even the foreign exchange students want to sit. Nobody ever got laid from installing NetBSD.

Once they are finished with their nerd cleansing, they can build a new Slashdot. A sexier Slashdot. A Slashdot the kids can dance to.

wbr1 writes: It seems abundantly clear now that Dice and the SlashBeta designers do not care one whit about the community here. They do not care about rolling in crapware into sourceforge installers. In short, the only thing that talks to them is money and stupid ideas.

Granted, it takes cash to run sites like these, but they were fine before. The question is, do some of you here want to band together, get whatever is available of slashcode and rebuild this community somewhere else? We can try to make it as it once was, a haven of geeky knowledge and frosty piss, delivered free of charge in a clean community moderated format.

dryriver writes: A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats, social media activities and the internet browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden. The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet. The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisa surveillance court oversight. The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10. "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email". US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do."Link to Original Source

I live in Vilnius, Lithuania (neighboring Latvia, for those who can't be bothered to look at the map) and pay 22 USD/month for 100 Mbps FTTH, no download caps. For additional 15 USD or so I can get cable TV with HD channels from the same provider.

But who the hell needs cable when torrents download at 70 Mbps or so?:)

I work for a major global outsourcing company (90K+ employees) and I sometimes wonder how do our clients put up with this. For example, a simple project (replacing one Wintel FTP server with another) is now taking more than 6 months to execute, and we are buying a complete server where a VMWare instance would be more than sufficient - load on that server is negligible. Entire project is costing maybe 30K $ just in time booked to the client - and that is something I could do in two days - but everybody takes it as "business as usual", including the client.

Makes me wanna go and start my own company, providing better quality services for 1/10th of a price. But then again, I wouldn't be able to claim that I've been in a market for 50 years and will not go bankrupt next year, crisis or no crisis.

Posted
by
samzenpuson Tuesday July 21, 2009 @10:56AM
from the all-we-need-is-a-little-patience dept.

H. Beatty Chadwick has been in a staring match with the judicial system for the past 14 years, and the system just blinked. Chadwick was ordered to pay his ex-wife $2.5 million after their divorce. He refused to pay saying that he couldn't because he lost the money in a series of "bad investments." The judge in the case didn't believe him and sent him to jail for contempt. That was 14 years ago. Last week another judge let Chadwick go saying that "continued imprisonment would be legal only if there was some likelihood that ultimately he would comply with the order; otherwise, the confinement would be merely punitive instead of coercive." Chadwick, now 73, is believed to have served the longest contempt sentence in US history.

Posted
by
timothyon Wednesday July 08, 2009 @05:30PM
from the detect-curse-words-and-fine-a-quarter-apiece dept.

Krneki writes "I've been developing monitoring solutions for the last five years. I have used Cacti, Nagios, WhatsUP, PRTG, OpManager, MOM, Perl-scripts solutions, ... Today I have changed employer and I have been asked to develop a new monitoring solution from scratch (5,000 devices). My objective is to deliver a solution that will cover both the network devices, servers and applications. The final product must be very easy to understand as it will be used also by help support to diagnose problems during the night. I need a powerful tool that will cover all I need and yet deliver a nice 2D map of the company IT infrastructure. I like Cacti, but usually I use it only for performance monitoring, since pooling can't be set to 5 or 10 sec interval for huge networks. I'm thinking about Nagios (but the 2D map is hard to understand), or maybe OpManager. What monitoring solution do you use and why?"

Posted
by
CmdrTacoon Thursday May 21, 2009 @08:44AM
from the because-it-was-boring dept.

brumgrunt writes "Sarah Connor was a non-populist, meditative, complex piece of television on a smash-bang, show-me-the-ratings kind of network. The two were never going to get on. Plus: how the Terminator name proved more hindrance than aid."

Michael writes: "A pair of bills introduced in the U.S. Senate (773 & 778) by Senator Jay Rockefeller would grant the White House sweeping new powers to access private online data, regulate the cybersecurity industry and even shut down Internet traffic during a declared "cyber emergency. A working draft of the legislation obtained by an Internet privacy group also spells out plans to grant the Secretary of Commerce access to all privately owned information networks deemed to be critical to the nation's infrastructure "without regard to any provision of law, regulation, rule or policy restricting such access.""Link to Original Source

Posted
by
kdawsonon Saturday April 11, 2009 @02:30PM
from the connecting-the-dots dept.

TheOtherChimeraTwin writes "I've been getting spam from mainstream companies that I do business with, which is odd because I didn't give those companies my email address. It is doubly strange because the address they are using is a special-purpose one that I wouldn't give out to any business. Apparently knotice.com ('Direct Digital Marketing Solutions') and postalconnect.net aka emsnetwork.net (an Equifax Marketing Service Product with the ironic name 'Permission!') are somehow collecting email addresses and connecting them with postal addresses, allowing companies to send email instead of postal mail. Has anyone else encountered this slimy practice or know how they are harvesting email addresses?"